{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T17:37:19Z","timestamp":1777570639611,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,17]],"date-time":"2021-10-17T00:00:00Z","timestamp":1634428800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,17]]},"DOI":"10.1145\/3474085.3475254","type":"proceedings-article","created":{"date-parts":[[2021,10,18]],"date-time":"2021-10-18T22:11:38Z","timestamp":1634595098000},"page":"826-834","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["Anti-Distillation Backdoor Attacks: Backdoors Can Really Survive in Knowledge Distillation"],"prefix":"10.1145","author":[{"given":"Yunjie","family":"Ge","sequence":"first","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Qian","family":"Wang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Baolin","family":"Zheng","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Xinlu","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Wuhan University, Wuhan, China"}]},{"given":"Qi","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Chao","family":"Shen","sequence":"additional","affiliation":[{"name":"Xi'an Jiaotong University, Xi'an, China"}]},{"given":"Cong","family":"Wang","sequence":"additional","affiliation":[{"name":"City University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2021,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Bullseye polytope: A scalable clean-label poisoning attack with improved transferability. arXiv preprint arXiv:2005.00191","author":"Aghakhani Hojjat","year":"2020"},{"key":"e_1_3_2_1_2_1","volume-title":"Andreas C. Damianou, Neil D.","author":"Ahn Sungsoo","year":"2019"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/2969033.2969123"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150464"},{"key":"e_1_3_2_1_5_1","volume-title":"SAANet: Spatial adaptive alignment network for object detection in automatic driving. Image and Vision Computing","author":"Chen Junying","year":"2020"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2018.00455"},{"key":"e_1_3_2_1_7_1","volume-title":"Targeted backdoor attacks on deep learning systems using data poisoning. arXiv preprint arXiv:1712.05526","author":"Chen Xinyun","year":"2017"},{"key":"e_1_3_2_1_8_1","volume-title":"2020 a. Backdoor attacks and defenses for deep neural networks in outsourced cloud environments","author":"Chen Yanjiao","year":"2020"},{"key":"e_1_3_2_1_9_1","volume-title":"2020 b. Deep learning on mobile and embedded devices: state-of-the-art, challenges and future directions. Comput. Surveys","author":"Chen Yanjiao","year":"2020"},{"key":"e_1_3_2_1_10_1","volume-title":"A survey of model compression and acceleration for deep neural networks. arXiv preprint arXiv:1710.09282","author":"Cheng Yu","year":"2017"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i04.5816"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_1_13_1","volume-title":"Badnets: Identifying vulnerabilities in the machine learning model supply chain. arXiv preprint arXiv:1708.06733","author":"Gu Tianyu","year":"2017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2016.90"},{"key":"e_1_3_2_1_15_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton Geoffrey","year":"2015"},{"key":"e_1_3_2_1_16_1","unstructured":"Jing Yu Koh. 2021. model zoo. https:\/\/modelzoo.co\/.  Jing Yu Koh. 2021. model zoo. https:\/\/modelzoo.co\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2999134.2999257"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385209.3385216"},{"key":"e_1_3_2_1_19_1","volume-title":"2020 b. Multi-targeted backdoor: Indentifying backdoor attack for multiple deep neural networks. IEICE Transactions on Information and Systems","author":"Kwon Hyun","year":"2020"},{"key":"e_1_3_2_1_20_1","volume-title":"Proc. of ICLR.","author":"Li Yige","year":"2021"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.14722\/ndss.2018.23291"},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of ICLR.","author":"Ma Haoyu","year":"2021"},{"key":"e_1_3_2_1_23_1","volume-title":"Proc. of ICML. 4743--4751","author":"Nayak Gaurav Kumar","year":"2019"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2016.41"},{"key":"e_1_3_2_1_25_1","volume-title":"The security of autonomous driving: Threats, defenses, and future directions. Proc","author":"Ren Kui","year":"2020"},{"key":"e_1_3_2_1_26_1","volume-title":"Antoine Chassang, Carlo Gatta, and Yoshua Bengio.","author":"Romero Adriana","year":"2014"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v34i07.6871"},{"key":"e_1_3_2_1_28_1","volume-title":"Deep model compression: Distilling knowledge from noisy teachers. arXiv preprint arXiv:1610.09650","author":"Sau Bharat Bhusan","year":"2016"},{"key":"e_1_3_2_1_29_1","unstructured":"Jose A Ortega Charlie parker Poul Petersen Tom Dietterich Francisco Martin. 2018. BigML. https:\/\/bigml.com\/.  Jose A Ortega Charlie parker Poul Petersen Tom Dietterich Francisco Martin. 2018. BigML. https:\/\/bigml.com\/."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3354209"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.754"},{"key":"e_1_3_2_1_32_1","volume-title":"Countermeasure against backdoor Attack on neural networks utilizing knowledge distillation. Journal of Signal Processing","author":"Yoshida Kota","year":"2020"},{"key":"e_1_3_2_1_33_1","volume-title":"Proc. of ACM ICML. 7614--7623","author":"Zhu Chen","year":"2019"},{"key":"e_1_3_2_1_34_1","volume-title":"To prune, or not to prune: exploring the efficacy of pruning for model compression. arXiv preprint arXiv:1710.01878","author":"Zhu Michael","year":"2017"}],"event":{"name":"MM '21: ACM Multimedia Conference","location":"Virtual Event China","acronym":"MM '21","sponsor":["SIGMM ACM Special Interest Group on Multimedia"]},"container-title":["Proceedings of the 29th ACM International Conference on Multimedia"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475254","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3474085.3475254","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:17Z","timestamp":1750193297000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3474085.3475254"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,17]]},"references-count":34,"alternative-id":["10.1145\/3474085.3475254","10.1145\/3474085"],"URL":"https:\/\/doi.org\/10.1145\/3474085.3475254","relation":{},"subject":[],"published":{"date-parts":[[2021,10,17]]},"assertion":[{"value":"2021-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}